Computer security : art and science / Matt Bishop
Material type:
- text
- unmediated
- volume
- 0201440997
- 9780201440997
- 005.8 21
- QA76.9.A25 B56 2003
Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Dato Maznah Library & Information Services | Open Collection | QA Mathematics | QA76.9.A25 B56 2003 (Browse shelf(Opens below)) | Available | 00001598 |
Browsing Dato Maznah Library & Information Services shelves, Shelving location: QA Mathematics, Collection: Open Collection Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.76.H94 W45 1998 Creative HTML design / | QA76.9.A23 D34 1996 Abstract Data Types : Specifications, Implementations, and Applications / | QA76.9.A25 A45 1996 The underground guide to computer security : slightly askew advice on protecting your PC and what ̓s on it / | QA76.9.A25 B56 2003 Computer security : art and science / | QA76.9.A25 G65 2011 Computer Security / | QA76.9.A25 J38 1999 Java 2 network security / | QA76.9.A25 K39 2002 Network security : private communication in a public world / |
Includes bibliographical references and index
pt. 1. Introduction -- 1. An overview of computer security -- pt. 2. Foundations -- 2. Access control matrix -- 3. Foundational results -- pt. 3. Policy -- 4. Security policies -- 5. Confidentiality policies -- 6. Integrity policies -- 7. Hybrid policies -- 8. Noninterference and policy composition -- pt. 4. Implementation I: cryptography -- 9. Basic cryptography -- 10. Key management -- 11. Cipher techniques -- 12. Authentication -- pt. 5. Implementation II: systems -- 13. Design principles -- 14. Representing identity -- 15. Access control mechanisms -- 16. Information flow -- 17. Confinement problem -- pt. 6. Assurance / by Elisabeth Sullivan -- 18. Introduction to assurance -- 19. Building systems with assurance -- 20. Formal methods -- 21. Evaluating systems -- pt. 7. Special topics -- 22. Malicious logic -- 23. Vulnerability analysis -- 24. Auditing -- 25. Intrusion detection -- pt. 8. Practicum -- 26. Network security -- 27. System security -- 28. User security -- 29. Program security -- pt. 9. End matter -- 30. Lattices -- 31. The extended Euclidean algorithm -- 32. Entropy and uncertainty -- 33. Virtual machines -- 34. Symbolic logic -- 35. Example academic security policy
There are no comments on this title.